Leads to certification with duration:
2 years
2 years
Cybersecurity
Cyber Security For Managers and IT Staff
This bundle includes management related topics of Cyber Security. It is a prerequisite for this course that "Cyber Security for Everyone" course is completed.
Curriculum content
-
You got to love a good disaster movie, right? Whether it’s a natural disaster or invaders from Mars, one small thing triggers a chain of events and leaves a trail of havoc and destruction in its wake. They’re exciting, and a little terrifying, but that’s ok, it’s just a movie. It wouldn’t happen in real life… But the truth is, disasters can happen. For businesses, they can spell… disaster! So, to combat the potential for catastrophe, you need a plan. Disaster recovery planning helps businesses map out how they’ll regain access to, and restore functions of, their IT systems after a disaster. By the end of this course, you’ll be able to: • Recognize how disaster can affect businesses • Identify the right disaster recovery plan • Define what is meant by fallback • Identify what needs to be included in your disaster recovery plan Why take this course? If you’re a business leader or if you manage systems, operations, or IT, this course will help ensure your disaster recovery plan won’t fail you. It’ll look at the different types of plans, what makes a good disaster recovery plan, and how fallback is used to get things back on track. 15 mins | SCORM | Takeaway Tasks
-
Ever received an email from your bank which seems to be legit but, well, there’s something off about it? Maybe it starts with, “Dear valued customer” instead of using your name? If you have received anything like this, then it’s likely you’ve been targeted by phishing criminals. Phishers pretend to be from authorized organizations to trick you into giving away sensitive information, such as usernames or credit card details. It’s a malicious and widespread activity. But suffering loss as a result can be prevented. One of the most effective ways is through anti-spam software which blocks suspicious emails from getting into your account. By the end of this course, you’ll be able to: • Recognize a phishing attack, for example an email or cell phone message • Understand how anti-spam software works to prevent email spamming • Protect yourself and avoid becoming a victim of phishing Why take this course? Phishing scammers release thousands of attacks every single day. Yet knowledge is power, and by learning how to spot the signs you will help to protect yourself. This short course is suitable for professionals, organizations, and any individual who uses a computer or cell phone. Yep, that means pretty much all of us. 15 mins | SCORM | Workbook
-
It seems like you can’t go a day without hearing about the latest hack or breach of data. Unfortunately, most modern tech is vulnerable to cyberattacks, delays, or malfunctions. If you get complacent about the tech you’re using, you’re leaving yourself open to potentially disastrous consequences. It doesn’t have to be this way. Individuals and companies alike should constantly be looking at what could go wrong and thinking of ways to respond to potential incidents. Doing so can turn those potential IT disasters into minor disruptions. Every second counts, and this course is designed to help you make the most of yours. By the end of this course, you’ll be able to: •Identify potential risks and recognize why swift incident response is required •Create a plan to help prepare for and manage an incident •Explain the incident response lifecycle in preparation for disruption Why take this course? Both companies and individuals should always be ready for a potential tech disaster. Some things will be beyond your control, but if you’re prepared, you can mitigate their impact. System vulnerabilities are there to be exploited by criminals, but if you get to them first or have a managed response to attacks, everyone will reap the benefits. 15 mins | SCORM | Takeaway Tasks
-
Imagine if your neighbor broke into your house while you’re at work to “borrow” your electricity. You’d be pretty annoyed! After all, you never said they could use it, and they’d end up costing you a lot of money. Now imagine someone’s “borrowing” your computer’s power to solve complex equations without you even realizing it. That’s basically what covert crypto mining or “cryptojacking” is. This course will help you understand the basics of cryptocurrency, how cryptojacking works, and how you can avoid it. By the end of this course, you’ll be able to: • Explain how cryptocurrency works and what is meant by “mining” • Define cryptojacking and recognize the signs it's happening • Implement ways to prevent cryptojacking Why take this course? The world of crypto is new and can be confusing, which means people can be easily exploited without their knowledge. This course, suitable for anyone, will give you a beginner's guide to the world of cryptocurrency and ensure you’re prepared to combat this new type of hacking. 10 mins | SCORM | Workbook
-
You might think coding is a mysterious art that only exists in IT departments. But it’s all around us, helping to manage our lives and keep the modern world working. Coding keeps trains running, cash registers bleeping, and phones ringing. And, believe it or not, just like any language, it can be pretty easy to pick up the basics. But, with so much of the world governed by code, and because it’s easy to learn basic coding, it can be used in the wrong way, too. This means the need for tighter cybersecurity is constantly growing. And, in business, keeping systems secure needs to be top priority. By the end of this course, you’ll be able to: • Identify common uses of coding in technology • Recognize code-based cybersecurity threats • Adopt safer ways of working with technology Why take this course? This course will help everyone understand how computer code can pose a cybersecurity threat. You’ll see where code is used, how it can pose a threat in your workplace, and how you can work smarter to avoid cybersecurity threats. 10 mins | SCORM | Takeaway Tasks
-
Watching the clouds in the sky can be relaxing on a lovely summer's day. But there are too many to count them all, and you’d probably get overwhelmed if you tried. Trying to choose a cloud vendor to take care of your organization’s data can feel overwhelming, too. Because just like real clouds in the sky, there are so many potential vendors out there. These days, organizations can’t afford not to engage with cloud services, as they can bring huge benefits to businesses. New potential vendors appear regularly, and it’s challenging to figure out which one is the best match for your organization. Recognizing the main different types of cloud services will help you make sense of what’s being offered. And understanding what to consider when choosing a vendor will help you make the right choice. By the end of this course, you’ll be able to: • Recognize the 3 main types of cloud services • Understand the importance of scalability • Identify the key considerations to explore when choosing a cloud vendor that meets your organization’s needs Why take this course? Everyone working in an IT environment needs to understand what to consider when choosing a cloud vendor. This course will help you make sense of the main types of cloud services offered by vendors. It’ll also help you understand the key considerations to explore when choosing a vendor, including scalability. 10 mins | SCORM | Workbook
-
An elite team of security experts designing covert missions to infiltrate systems, and apprehend bad guys sounds like a terrific movie plot, right? Great for a night in with a bucket of popcorn. But in the world of cybersecurity, what might sound like a movie plot, is actually real. Penetration testing is the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit. It’s become an important part of business security, and as technology grows, so does the need for penetration testing. By the end of this course, you’ll be able to: • Define what penetration testing is, and why it’s needed • Identify types of penetration testing • Identify the necessary parts of an effective penetration testing system Why take this course? If you’re a business leader, or IT, operations, or security manager, this course can help you add a vital tool to your security program. It’ll look at what penetration testing is, and how it can be applied, both physically and virtually. And by following the advice in this course, you’ll be able to set up a penetration testing system that’ll keep the business, and its data, safe. 10 mins | SCORM | Takeaway Tasks
-
Before going on vacation, you check all the windows are secured, hide your valuables, and lock your doors. You don’t want to be robbed – no one does! You do these things because you know most thieves will get in through an open window or door, especially if something enticing is on show. You know the common vulnerabilities, and you try to prevent them. The same is true for your applications. Criminals often attack the same common vulnerabilities in applications to commit cybercrimes. This course will help you understand and manage application vulnerabilities to prevent them from being exploited, so you can ensure you’ve secured your cyber windows. By the end of this course, you’ll be able to: • Describe why exposing application vulnerabilities is so important • Understand what lessons can be learned from vulnerabilities • Use the 5 stages of vulnerability management to prevent applications from being exploited Why take this course? No one wants their applications to have a glaring hole in them, ready for someone to exploit. This course will help you recognize common security vulnerabilities to ensure your applications aren’t vulnerable. Suitable for anyone in an IT team or security management, this course will also suggest ways to keep your applications secure to help prevent cybercrime. 15 mins | SCORM | Workbook
-
Ah, cryptography! The ancient art of… something that sounds pretty complicated. If that was your 1st reaction, you’re not entirely wrong. But it might surprise you to learn that if you’ve ever used online banking, you’ve already benefited from the protection cryptography offers. Because it’s all about keeping your communications and data secure, so cybercriminals can’t obtain it. Cryptography already plays a role in keeping data and communications safe within your organization, too. Understanding why this is necessary and how it’s accomplished will help you understand how you and your organization can outsmart sophisticated cybercriminals. By the end of this course, you’ll be able to: • Understand the importance of cryptography and how it protects organizations and individuals from being targeted by cybercriminals • Define ciphers and keys and their role in encryption and decryption • Recognize the difference between symmetric and asymmetric cryptography Why take this course? Anyone could be a victim of cybercrime, from individuals to organizations. That’s why everyone can benefit from understanding the techniques used to outsmart criminals and keep data and communications secure. This course will introduce you to why cryptography is needed along with how it’s implemented. 10 mins | SCORM | Workbook
-
Monday, 8 am. You turn on your laptop and read the words that every business fears: *YOUR FILES HAVE BEEN ENCRYPTED!* An accompanying message says that “unless you transfer Bitcoins in the next 24 hours, all your data will be destroyed.” It’s a ransomware attack. They’re dangerous, they’re damaging, and they’re on the rise. Ransomware attacks can cost businesses hundreds of thousands of dollars, so you need to know how to protect yourself against them. Any sector can be a target – from businesses of any size to institutions like schools or universities. The good news is that there are actions you can take to prepare you for a potential ransomware attack and to mitigate what happens after one. This course will show you how. By the end of this course, you’ll be able to: • Describe common types of ransomware attacks • Identify what common ransomware attacks look like and what action to take • Adopt ways to defend yourself or your business against future ransomware attacks Why take this course? Whether you’re working from home or in the office, it’s vital that you and everyone else in your organization are prepared for ransomware attacks, know how to identify them, and understand what to do if you’re a target. This course will show you how to prepare for and protect against ransomware attacks. 10 mins | SCORM | Takeaway Tasks
-
Risk is everywhere. Just by having your morning shower, you risk getting shampoo in your eyes and being temporarily blinded by soapsuds. But it isn’t just humans who are at risk. Computer networks are also highly vulnerable and susceptible to potential dangers. These include cyberattacks which can result in sensitive data being compromised and breached. Yet, there are ways of reducing and managing serious risks by implementing effective security and compliance audits. By the end of this course, you’ll be able to: • Identify the differences between security and compliance • Recognize the importance of audits and why these must be carried out • Understand how to prepare for and conduct effective audits Why take this course? If you’re an employer or work for an organization with an IT infrastructure, carrying out security and compliance audits is essential. This course will show you why effective auditing will help preserve the safety of your clients and customers’ data. We know they’re not exactly fun. But without auditing, you’re at risk of suffering a major cybersecurity headache and losing vital business…which is a lot worse than getting shampoo in your eyes. 10 mins | SCORM | Workbook
-
Any organization, regardless of size or sector, can become a victim of cybercrime. The organization you work for is no different. You may feel confident that your existing protection against attacks is sufficient. But as you’ll already know, traditional methods like firewalls and even antivirus software aren’t enough to keep attacks at bay. So what is? Having a Threat Monitoring policy in place is key. The strategy you take towards detection and prevention, and which service provider you use will have a huge impact in keeping your data safe. This course is designed to help you protect against attacks rather than just responding to them. This will help preserve your company's reputation and also keep your networks and data safe. By the end of this course, you’ll be able to: • Understand why organizations need to invest in threat monitoring • Define the difference between detection and prevention and the role played by each • Recognize the value of continuous security monitoring (CSM) and working with external Managed Security Service Providers (MSSPs) Why take this course? IT managers and teams and security managers all need to understand the value of threat monitoring. This course will tell you why it’s essential. It’ll also walk you through how to prevent rather than just detect attacks and how continuous security monitoring can help your organization up its threat-monitoring game. 10 mins | SCORM | Workbook
-
The modern office is becoming increasingly cloud-based and digitalized. This has some obvious benefits, such as cost and space savings. But it does open up some other issues, particularly when it comes to cyber threats. Criminals are evolving the ways in which they can take advantage of new vulnerabilities in systems. So, to be secure, you’ve got to be proactive. Preventative security tech, such as firewalls and antivirus software are useful tools that certainly help to protect against obvious threats. But what about more sophisticated threats that can evade these controls? Threat surveillance must be in place 24/7 to help comply with regulatory requirements, detect a broader range of threats, and reduce threat response time. This course can help you get started. By the end of this course, you’ll be able to: • Identify potential threats to be monitored • Adopt ways to best protect your systems • Recognize the most vulnerable networks for 24/7 monitoring Why take this course? If you are an IT, operations, or security manager, or even a business leader, then it’s crucial to continuously monitor cybersecurity threats. Being part of a larger cybersecurity plan, monitoring and threat surveillance can help your organization stop attacks in their infancy before they get the chance to cause damage and disruption. 10 mins | SCORM | Takeaway Tasks